
* Changed reddwarf.conf.test to reflect local mode. * Updated fake keystone. Any token is treated as the tenant ID, and any tenant id starting with "admin" is treated as an admin.
93 lines
3.3 KiB
Python
93 lines
3.3 KiB
Python
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
|
|
|
# Copyright 2011 OpenStack LLC.
|
|
# All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
import httplib2
|
|
import logging
|
|
import re
|
|
import webob.exc
|
|
import wsgi
|
|
|
|
from reddwarf.common import exception
|
|
|
|
LOG = logging.getLogger(__name__)
|
|
|
|
|
|
class AuthorizationMiddleware(wsgi.Middleware):
|
|
|
|
def __init__(self, application, auth_providers, **local_config):
|
|
self.auth_providers = auth_providers
|
|
LOG.debug(_("Auth middleware providers: %s") % auth_providers)
|
|
super(AuthorizationMiddleware, self).__init__(application,
|
|
**local_config)
|
|
|
|
def process_request(self, request):
|
|
roles = request.headers.get('X_ROLE', '').split(',')
|
|
LOG.debug(_("Processing auth request with roles: %s") % roles)
|
|
tenant_id = request.headers.get('X-Tenant-Id', None)
|
|
LOG.debug(_("Processing auth request with tenant_id: %s") % tenant_id)
|
|
for provider in self.auth_providers:
|
|
provider.authorize(request, tenant_id, roles)
|
|
|
|
@classmethod
|
|
def factory(cls, global_config, **local_config):
|
|
def _factory(app):
|
|
LOG.debug(_("Created auth middleware with config: %s") %
|
|
local_config)
|
|
return cls(app, [TenantBasedAuth()],
|
|
**local_config)
|
|
return _factory
|
|
|
|
|
|
class TenantBasedAuth(object):
|
|
|
|
# The paths differ from melange, so the regex must differ as well,
|
|
# reddwarf starts with a tenant_id
|
|
tenant_scoped_url = re.compile("/(?P<tenant_id>.*?)/.*")
|
|
|
|
def authorize(self, request, tenant_id, roles):
|
|
if 'admin' in [role.lower() for role in roles]:
|
|
LOG.debug(_("Authorized admin request: %s") % request)
|
|
return True
|
|
match_for_tenant = self.tenant_scoped_url.match(request.path_info)
|
|
if (match_for_tenant and
|
|
tenant_id == match_for_tenant.group('tenant_id')):
|
|
LOG.debug(_("Authorized tenant '%(tenant_id)s' request: "
|
|
"%(request)s") % locals())
|
|
return True
|
|
msg = _("User with tenant id %s cannot access this resource") \
|
|
% tenant_id
|
|
LOG.debug(msg)
|
|
raise webob.exc.HTTPForbidden(msg)
|
|
|
|
|
|
def admin_context(f):
|
|
"""
|
|
Verify that the current context has administrative access,
|
|
or throw an exception. Reddwarf API functions typically take the form
|
|
function(self, req), or function(self, req, id).
|
|
"""
|
|
def wrapper(*args, **kwargs):
|
|
try:
|
|
req = args[1]
|
|
context = req.environ.get('reddwarf.context')
|
|
except:
|
|
raise exception.ReddwarfError("Cannot load request context.")
|
|
if not context.is_admin:
|
|
raise exception.Forbidden("User does not have admin privileges.")
|
|
return f(*args, **kwargs)
|
|
return wrapper
|